The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://www.kb.cert.org/vuls/id/229438 | third party advisory us government resource |
https://cwe.mitre.org/data/definitions/284.html | not applicable |
https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ | press/media coverage third party advisory |
https://kb.cert.org/vuls/id/229438 | third party advisory us government resource |